Train together, save more! 10% off individual registration, 20% off for pairs.
Log in

Or create your account

You have just added to your selection
Your cart is empty, See our trainings

Description

This cycle will provide you with all the knowledge necessary to define and implement the company's security policy. You will learn to meet security requirements in IT communications and information system architecture. This cycle will also deal with ISO standards relating to this area, with a particular focus on risk analysis and the implementation of a backup and continuity plan.

Who is this training for ?

For whom ?

Engineers, experts, IT consultants.

Prerequisites

Good knowledge of computer systems and networks.

Training objectives

  • Know the different areas of IS security
  • Carry out a security risk analysis
  • Secure the network and applications
  • Define a backup and continuity plan
  • Training program

    • Information systems security
      • - The notion and types of risk (potentiality, impact, accident, error, malicious intent).
      • - The DIC classification.
      • - Risk management (prevention, protection, risk transfer, outsourcing).
      • - CISO, conductor of security.
      • - Role and responsibility.
      • - Normative and regulatory frameworks.
      • - Towards IT governance, links with ITIL and CMMI.
      • - The ISO standard in a management systems approach.
      • - ISO 27001 certification.
      • - Risk analysis.
      • - How to build your own threat/vulnerability knowledge base? Active methods: EBIOS/FEROS, MEHARI.
      • - Security audits.
      • - Best practices of standard 19011 applied to security.
    • Awareness and communication
      • - Implement an awareness and communication plan.
      • - The security charter, its legal existence, its content, its validation.
      • - Risk coverage.
      • - Backup, continuity, recovery and crisis management plans.
      • - Design optimal solutions.
      • - Approach to security solutions adapted to each action.
      • - Defining a target architecture.
      • - Choose between IDS and IPS, content control as a necessity.
      • - Deploying a PKI project, the pitfalls to avoid.
      • - Authentication techniques, SSO, identity federation.
      • - Legal principles applicable to IS.
      • - Tort and contractual liability .
      • - Recommendations for legal IT security.
      • - Cyber ​​surveillance of employees, legal limits and constraints.
    • Network and Internet security

      - n'as pas encore du programme

    • Application security and monitoring

      - n'as pas encore du programme

    • Risk analysis

      - n'as pas encore du programme

    • The emergency and continuity plan
      • - The challenges for the company of a continuity strategy: laws and regulations, norms and standards.
      • - Define the continuity strategy.
      • - The phases of 'a continuity plan project.
      • - Risk analysis for the continuity plan.
      • - Identification of critical activities.
      • - The elements and budget to develop the scenarios.
      • - Rescue teams: constitution, roles.
      • - The principles of triggering the emergency plan.
    • 879
    • 84 h

    Submit your review

    Translated By Google Translate